top of page

About

Computer Forensics, also known as Cyber Forensics refers to the analysis of information in the computer systems, with the objective of finding any digital evidence that can be used for legal proceedings, but also to discover the cause of an incident. Computer forensics is the process of extracting data and information from computer systems to function as digital evidence for civic purposes, or in most cases to prove and legally impeach cybercrime.


The purpose of computer forensics is to provide forensic practices, legal processes, and ethical principles to assure reliable and detailed digital evidence that can be used for the courtroom needs. The objective of computer forensics is to guarantee a well-structured investigation and a follow-up of processes in order to resolve incidents and malfunctions in an organization.


Why is Computer Forensics important?

A forensics process is applied after the cyber attack or incident has occurred in order to collect and analyze the data to determine what happened, how did it happen and why did it happen? Computer forensics can be used as a tool to exploit backdoors that should be patched. A computer forensics investigation is a proficient mechanism that allows organizations’ to rationalize their time and immense financial impacts.


An internationally recognized computer forensic professional will be able to provide a detailed investigation of computer systems and assist the law enforcement authorities. Computer forensics’ provide you with the advantage of learning and practicing the latest comprehensive security methodologies of network systems, encryption technology, file operating systems, and criminal science.


Benefits of Computer Forensics


By becoming Certified Computer Forensics Professional you will be able to:


  • Understand the role of computer forensics in the business world.


  • Support an organization to prevent incident occurrence


  • Learn the prime forensic skills that can be applied in different situations.


  • Improve your forensic techniques and tools to identify and respond to cybercrimes.


  • Become an internationally recognized digital forensic professional


Who is this Computer Forensics Foundation?


Computer Forensics Foundation is a training course and certification that enables you to learn the basic elements to implement Computer Forensics processes. During this course, you will be able to understand computer forensics tools that are used to implement the forensics evidence recovery and analytical processes.


After completing this course, you can sit for the exam and apply for the “PECB Certificate Holder in Computer Forensics Foundation” certificate. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, processes and management approach.


Who is this Computer Forensics Training & Certification for?


  • Individuals interested in Computer Forensics Processes


  • Individuals seeking to gain knowledge about the main processes of Computer Forensics


  • Individuals interested to pursue a career in Computer Forensics


Learning Objectives

  • Understand the basic concepts of Computer Forensics


  • Understand the approaches, methods and techniques used to effectively manage Computer Forensics Processes


Educational Approach


  • Lecture sessions are illustrated with practical questions and examples


  • Practical exercises include examples and discussions


  • Practice tests are similar to the Certificate Exam


Prerequisites


There are no prerequisites for taking this course. 

Modules

AIGP.png

Module 1 : Identifying Security Compliance Measures

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 2 : Recognizing and Addressing Social Engineering Attack

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 3 : Securing Devices

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 4 : Using the Internet Securely

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

Soft Gradient Background

Receive an Official ISACA Certificate

LinkedIn_logo_initials.png

Receive a LinkedIn Badge

Gain a Certificate After Completion

Highlight your achievement by adding this credential to your LinkedIn profile, CV, or résumé. Your digital certificate will be awarded upon successful completion of the programme, giving you a recognised credential to share with employers, colleagues, and clients.

Course Certificate.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png

Exam Details

The exam fully meets the requirements of the PECB Examination and Certificate Programme. 


It covers the following competency domains:


Domain 1: Fundamental principles and concepts of Computer Forensics


Domain 2: Computer Forensics Processes

Course Study Options

Self Study

Online Study at Your Own Pace

In-Person Training

12 Locations in Middle East. View

Live Online Training

Course Duration : Flexible

Soft Gradient Background
sandra 1.png

Discuss This Course With Us

Hello, I’m Sandra, Assistant Manager at MENA Executive Training.

I'm here to talk you through the details of this course, answer any questions you may have and help get you booked in!

You May Also Be Interested In

Rock Logo
IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Soft Gradient Background
Qatari Man.png
a.jpg

Computer Forensics | Foundation

Taught : Online & In-Person & Self-Study

Official Training

Language : undefined

Duration : Flexible

Rock Logo
bottom of page